Research Article
Other versions:
- Article InfoArticle Info
- CitationCitation
- MetricsMetrics
- CommentComment
- RelatedRelated
- CitedCited
JUCS - Journal of Universal Computer Science 19(10): 1351-1374
doi:
10.3217/jucs-019-10-1351
Received:
06 Mar 2012 | Approved:
29 Mar 2013 | Published:
28 May 2013
This article is part of:
Authors
Jia Fan
- Corresponding author
Science and Technology on Communication Security Laboratory, Chengdu, China
Articles by this author in:
CrossRef
|
Google Scholar
University of North Carolina at Charlotte, Charlotte, United States of America
Articles by this author in:
CrossRef
|
Google Scholar
Southwest Jiaotong University, Chengdu, China
Articles by this author in:
CrossRef
|
Google Scholar
Conflict of interest
The authors have declared that no competing interests exist.
This article is freely available under the J.UCS Open Content License.